Sciweavers

15379 search results - page 3037 / 3076
» Protecting users from
Sort
View
ML
2006
ACM
143views Machine Learning» more  ML 2006»
13 years 8 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
PRESENCE
2008
110views more  PRESENCE 2008»
13 years 8 months ago
Modeling of Tool-Tissue Interactions for Computer-Based Surgical Simulation: A Literature Review
Surgical simulators present a safe and potentially effective method for surgical training, and can also be used in robot-assisted surgery for pre- and intra-operative planning. Ac...
Sarthak Misra, K. T. Ramesh, Allison M. Okamura
PRESENCE
2006
102views more  PRESENCE 2006»
13 years 8 months ago
The Usability of Collaborative Virtual Environments and Methods for the Analysis of Interaction
This paper describes two methods for analyzing interactions in collaborative virtual environments (CVEs): one whereby quantitative data are captured, interaction is categorized in...
Ralph Schroeder, Ilona Heldal, Jolanda G. Tromp
SIGIR
2008
ACM
13 years 8 months ago
Towards breaking the quality curse.: a web-querying approach to web people search
Searching for people on the Web is one of the most common query types to the web search engines today. However, when a person name is queried, the returned webpages often contain ...
Dmitri V. Kalashnikov, Rabia Nuray-Turan, Sharad M...
SIGIR
2008
ACM
13 years 8 months ago
Information access to cultural heritage
The workshop on Information Access to Cultural Heritage (IACH 2008) was held during the ECDL conference in Aarhus on the 18th September 2008. The workshop provided a venue to brin...
Martha Larson, Kate Fernie, Johan Oomen, Juan Migu...
« Prev « First page 3037 / 3076 Last » Next »